/security/selinux/ |
D | nlmsgtab.c | 136 int i, err = -EINVAL; in nlmsg_perm() local 141 err = 0; in nlmsg_perm() 145 return err; in nlmsg_perm() 150 int err = 0; in selinux_nlmsg_lookup() local 154 err = nlmsg_perm(nlmsg_type, perm, nlmsg_route_perms, in selinux_nlmsg_lookup() 159 err = nlmsg_perm(nlmsg_type, perm, nlmsg_tcpdiag_perms, in selinux_nlmsg_lookup() 164 err = nlmsg_perm(nlmsg_type, perm, nlmsg_xfrm_perms, in selinux_nlmsg_lookup() 175 err = nlmsg_perm(nlmsg_type, perm, nlmsg_audit_perms, in selinux_nlmsg_lookup() 182 err = -ENOENT; in selinux_nlmsg_lookup() 186 return err; in selinux_nlmsg_lookup()
|
D | hooks.c | 3312 int err = 0; in selinux_file_fcntl() local 3317 err = file_has_perm(cred, file, FILE__WRITE); in selinux_file_fcntl() 3328 err = file_has_perm(cred, file, 0); in selinux_file_fcntl() 3338 err = file_has_perm(cred, file, FILE__LOCK); in selinux_file_fcntl() 3342 return err; in selinux_file_fcntl() 3898 int err; in selinux_skb_peerlbl_sid() local 3906 err = security_net_peersid_resolve(nlbl_sid, nlbl_type, xfrm_sid, sid); in selinux_skb_peerlbl_sid() 3907 if (unlikely(err)) { in selinux_skb_peerlbl_sid() 3973 int err = 0; in selinux_socket_post_create() local 3980 err = socket_sockcreate_sid(tsec, isec->sclass, &(isec->sid)); in selinux_socket_post_create() [all …]
|
D | xfrm.c | 290 int err; in selinux_xfrm_policy_alloc() local 294 err = selinux_xfrm_sec_ctx_alloc(ctxp, uctx, 0); in selinux_xfrm_policy_alloc() 295 if (err == 0) in selinux_xfrm_policy_alloc() 298 return err; in selinux_xfrm_policy_alloc() 356 int err; in selinux_xfrm_state_alloc() local 360 err = selinux_xfrm_sec_ctx_alloc(&x->security, uctx, secid); in selinux_xfrm_state_alloc() 361 if (err == 0) in selinux_xfrm_state_alloc() 363 return err; in selinux_xfrm_state_alloc()
|
D | selinuxfs.c | 382 goto err; in sel_open_policy() 386 goto err; in sel_open_policy() 391 goto err; in sel_open_policy() 401 goto err; in sel_open_policy() 410 err: in sel_open_policy() 1810 goto err; in sel_fill_super() 1816 goto err; in sel_fill_super() 1822 goto err; in sel_fill_super() 1827 goto err; in sel_fill_super() 1842 goto err; in sel_fill_super() [all …]
|
D | netif.c | 278 int i, err; in sel_netif_init() local 288 return err; in sel_netif_init()
|
/security/selinux/ss/ |
D | conditional.c | 235 goto err; in cond_read_bool() 242 goto err; in cond_read_bool() 249 goto err; in cond_read_bool() 252 goto err; in cond_read_bool() 256 goto err; in cond_read_bool() 259 err: in cond_read_bool() 288 goto err; in cond_insertf() 303 goto err; in cond_insertf() 314 goto err; in cond_insertf() 320 goto err; in cond_insertf() [all …]
|
D | services.c | 150 goto err; in selinux_set_mapping() 170 goto err; in selinux_set_mapping() 186 err: in selinux_set_mapping() 2078 goto err; in security_load_policy() 2083 goto err; in security_load_policy() 2091 goto err; in security_load_policy() 2104 goto err; in security_load_policy() 2135 err: in security_load_policy() 2564 goto err; in security_get_bools() 2569 goto err; in security_get_bools() [all …]
|
/security/integrity/ |
D | digsig.c | 40 int err = PTR_ERR(keyring[id]); in integrity_digsig_verify() local 41 pr_err("no %s keyring: %d\n", keyring_name[id], err); in integrity_digsig_verify() 43 return err; in integrity_digsig_verify()
|
/security/keys/ |
D | process_keys.c | 328 key_ref_t key_ref, ret, err; in search_my_process_keyrings() local 339 err = ERR_PTR(-EAGAIN); in search_my_process_keyrings() 355 err = key_ref; in search_my_process_keyrings() 376 err = key_ref; in search_my_process_keyrings() 400 err = key_ref; in search_my_process_keyrings() 420 err = key_ref; in search_my_process_keyrings() 426 key_ref = ret ? ret : err; in search_my_process_keyrings() 446 key_ref_t key_ref, ret = ERR_PTR(-EACCES), err; in search_process_keyrings() local 454 err = key_ref; in search_process_keyrings() 485 if (err == ERR_PTR(-ENOKEY) || ret == ERR_PTR(-ENOKEY)) in search_process_keyrings() [all …]
|
D | compat.c | 43 goto err; in compat_keyctl_instantiate_key_iov() 48 err: in compat_keyctl_instantiate_key_iov()
|
D | keyring.c | 335 long err; in keyring_search_aux() local 343 err = key_task_permission(keyring_ref, cred, KEY_SEARCH); in keyring_search_aux() 344 if (err < 0) { in keyring_search_aux() 345 key_ref = ERR_PTR(err); in keyring_search_aux() 356 err = -EAGAIN; in keyring_search_aux() 435 err = key->type_data.reject_error; in keyring_search_aux() 485 key_ref = ERR_PTR(err); in keyring_search_aux()
|
D | keyctl.c | 1136 goto err; in keyctl_instantiate_key_iov() 1141 err: in keyctl_instantiate_key_iov()
|
/security/smack/ |
D | smackfs.c | 2283 int err; in init_smk_fs() local 2289 err = smk_init_sysfs(); in init_smk_fs() 2290 if (err) in init_smk_fs() 2293 err = register_filesystem(&smk_fs_type); in init_smk_fs() 2294 if (!err) { in init_smk_fs() 2298 err = PTR_ERR(smackfs_mount); in init_smk_fs() 2307 if (err == 0 && rc < 0) in init_smk_fs() 2308 err = rc; in init_smk_fs() 2310 if (err == 0 && rc < 0) in init_smk_fs() 2311 err = rc; in init_smk_fs() [all …]
|
/security/selinux/include/ |
D | xfrm.h | 87 int err = selinux_xfrm_decode_session(skb, sid, 0); in selinux_skb_xfrm_sid() local 88 BUG_ON(err); in selinux_skb_xfrm_sid()
|
/security/integrity/evm/ |
D | evm_main.c | 423 goto err; in init_evm() 427 err: in init_evm()
|
/security/tomoyo/ |
D | tomoyo.c | 128 const int err = tomoyo_find_next_domain(bprm); in tomoyo_bprm_check_security() local 130 return err; in tomoyo_bprm_check_security()
|